Rio 2016 Malware: Sphinx Banking Trojan Alvos Bancos Brasileiros - Como, Tecnologia e Fórum de Segurança PC |

Rio 2016 Malware: Sphinx Banking Trojan Alvos Bancos Brasileiros


O bancário Esfinge Zeus Trojan surgiu pela primeira vez em agosto 2015, exatamente um ano atrás, mas foi recentemente atualizado e detectado em novas campanhas. Desta vez Esfinge tem como alvo os bancos e Boleto brasileiros, métodos de pagamento brasileiros. não é de surpreender, the attacks are clearlyinspiredby the Olympic Games in Rio. We already wrote about the potential threats of this global event, and we’re not surprised to see this banking Trojan being so active during this particular time.

relacionado: Rio 2016 Olimpíadas de temática scams e malware estão em ascensão

More about Sphinx Banking Trojan

The very first thing to mention here is that Sphinx is a member of the notorious and infamous Zeus banking malware. It’s coded in C++ and, expectedly, is based on the source code of Zeus. Previously Sphinx was spotted taking full advantage of the Tor network, as revealed by a TrendMicro research. The Trojan is an expert in avoiding detection and being immune to sinkholing, blacklisting and even to the Zeus tracking tool, developed to track Zeus Command&Control servers (anfitriões) around the world and provide a domain- and an IP-blocklist.

The initial campaigns of the banking Trojan victimized banks mainly situated in the UK, as revealed by an IBM X-Force report from October 2015:

Zeus Sphinx is crimeware that emerged in underground fraud forums in late August 2015, offered for sale by a Russian-speaking vendor for $500 per binary — without a malware builder. This means that Sphinx’s vendor is not enabling fraudsters to independently generate new malware files. Fraudsters would have to buy a new variant generated by the vendor every time their current one gets detected as malicious by signature-based security solutions.

How Is Sphinx Currently Being Spread?

Similarly to other Zeus bankers, the Trojan is spread via web injects that overlay fake websites. Uma vez feito isso, the banker will exfiltrate the collected data via a hidden VNC (Virtual Network Computing) conexão.

In the latest Brazilian update, Sphinx has included web inject configurations able to target the web portal of three famous Brazilian banks, as well as the Boleto payment methods.

Além disso, this latest variant of Sphinx supports a multi-step injection that has includes social engineering tactics and enables cyber criminals to trick users and collect their authentication codes from card readers.

Web injects are also employed to lure users into downloading mobile applications that steal transaction authentication codes sent by the bank via SMS.

Rio Olympics 2016 Have Stirred the Underground Brazilian Market

Another infamous banker has also received a notable update – the Panda banking Trojan. In June this year, Panda was sent to LinkedIn users via email, in an aggressive post-breach phishing campaign. An earlier campaign, from March, showed that Panda was actively spread via macros in Word documents and exploit kits.

No geral, banking Trojans are quite popular today, perhaps nearly as popular as ransomware. Financial theft malware is a preferred method employed by cyber crooks all around the world. Users should always be prepared, especially when a globally important event is on the horizon.

Zeus bankers are particularly dangerous, as they take up to 15% of all such attacks, at least at this point.
Banking Trojans have caused great damage to unsuspecting users, generating fraudulent transactions and stealing banking credentials. Attack scenarios can go even worse, if the particular banking Trojan installs additional malware such as ransomware or spyware. Since banking malware continues to be a huge issue in cyber security, being protected against it is a must.

How to Protect Yourself from Banking Trojans like Sphinx and Panda

For obvious security-related concerns, macros are usually disabled by Microsoft by default. Contudo, cyber criminals know that and always find ways to make potential victims enable macros, exactly like in the case of Panda attacks.

Em resumo, to increase one’s security against banking malware, and any malware really, Siga esses passos:

  • Disable macros in Microsoft Office applications. The very first thing to do is check if macros are disabled in Microsoft office. Para maiores informações, visit Microsoft Office’s official page. Keep in mind that if you are an enterprise user, the system administrator is the one who is in charge of the macro default settings.
  • Don’t open (or reply to) suspicious emails. Simple as that. If you receive an unexpected email from an unknown sender – like an invoice – don’t open it before making sure it is legitimate. Spam is the primary way of distributing macro malware.
  • Employ anti-spam measures. Use anti-spam software, spam filters, aimed at examining incoming email. Such software isolates spam from regular emails. Spam filters are designed to identify and detect spam, and prevent it from reaching your inbox. Make sure to add a spam filter to your email. Gmail users can refer to Google’s support page.
  • Keep all of your browsers and apps updated. Malware is known to take advantage of software vulnerabilities. Skipping updates is a risky road. If you have many apps installed on your system, you can rely on a program like Secunia Personal Inspector.

And don’t forget to keep your anti-malware program running at all times!


Remoção de Malware Ferramenta

digitalizador Spy Hunter só irá detectar a ameaça. Se você quiser a ameaça de ser removido automaticamente, você precisa comprar a versão completa da ferramenta anti-malware.Saiba Mais Sobre SpyHunter Anti-Malware Ferramenta / Como desinstalar o SpyHunter


Milena Dimitrova

Um escritor inspirado e gerenciador de conteúdo que foi com SensorsTechForum para 4 anos. Gosta de ‘Sr.. Robot’e medos‘1984’. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar